Security Features |
Security reporting creates a snapshot of metadata-layer access control settings. SAS provides the %MDSECDS autocall macro to enable you to easily build data sets of permissions information. You can use those data sets as the data source for security reports. You can also identify changes in settings by comparing data sets that are generated at different times. See Security Report Macros.
Security logging records security-related events as part of a system-wide logging facility. The following table describes the security log categories:
Category | Events Captured |
---|---|
Audit.Authentication | Authentication events, client connection information. |
Audit.Meta.Security.UserAdm | Changes to users, groups, roles, logins, and authentication domains. Includes additions, deletions, modifications, and failed attempts to perform these actions. |
Audit.Meta.Security.GrpAdm | Changes to memberships (for groups or roles). Includes adding members, removing members, and failed attempts to perform these actions. |
Audit.Meta.Security.AccCtrlAdm | Changes to permissions, permission settings, ACTs, and passwords.* Includes additions, deletions, modifications, and failed attempts to perform these actions. |
Audit.Meta.Security | The parent category for security events. Logging settings that you define for this category apply to its child categories. |
* This is for passwords on objects such as Tables, Connections, and ProtectedPassthrus. |
Copyright © 2011 by SAS Institute Inc., Cary, NC, USA. All rights reserved.